Sciweavers

2478 search results - page 255 / 496
» Message from the Chair
Sort
View
116
Voted
INFOCOM
2007
IEEE
15 years 11 months ago
How Optimal are Wireless Scheduling Protocols?
— In wireless networks mutual interference impairs the quality of received signals and might even prevent the correct reception of messages. It is therefore of paramount importan...
Thomas Moscibroda, Yvonne Anne Oswald, Roger Watte...
140
Voted
INFOCOM
2007
IEEE
15 years 11 months ago
A Localization-Based Anti-Sensor Network System
—In this paper, an anti-sensor network system is proposed, aiming to protect an important area from being under surveillance by an adversary’s sensor nodes. The major component...
Zhimin Yang, Eylem Ekici, Dong Xuan
MOBIQUITOUS
2007
IEEE
15 years 11 months ago
Diffusion-based Approach to Deploying Wireless Sensors to Satisfy Coverage, Connectivity and Reliability
An important objective of wireless sensor networks (WSNs) is to reliably sense data about the environment in which they are deployed. Reliability in WSNs has been widely studied in...
Renita Machado, Sirin Tekinay
FC
2007
Springer
122views Cryptology» more  FC 2007»
15 years 10 months ago
What Instills Trust? A Qualitative Study of Phishing
This paper reports the highlights of a user study which gauges reactions to a variety of common “trust indicators” – such as logos, third party endorsements, and padlock icon...
Markus Jakobsson, Alex Tsow, Ankur Shah, Eli Blevi...
130
Voted
ISI
2007
Springer
15 years 10 months ago
A Combinatorial Approach to Measuring Anonymity
— In this paper we define a new metric for quantifying the degree of anonymity collectively afforded to users of an anonymous communication system. We show how our metric, based...
Matthew Edman, Fikret Sivrikaya, Bülent Yener